Network steganography based security framework for cyber-physical systems
From MaRDI portal
Publication:6203495
DOI10.1016/j.ins.2022.07.081MaRDI QIDQ6203495
Xiu-Xiu Ren, Xiaoguang Zhang, Guang-Hong Yang
Publication date: 27 March 2024
Published in: Information Sciences (Search for Journal in Brave)
cyber-physical systemsattack detectioncovert channeleavesdropping attack defensenetwork steganography
Filtering in stochastic control theory (93E11) Estimation and detection in stochastic control theory (93E10) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Cites Work
- Unnamed Item
- Unnamed Item
- State estimation under false data injection attacks: security analysis and system protection
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Optimal sensor attacks in cyber-physical systems with round-robin protocol
- A dynamic event-triggered resilient control approach to cyber-physical systems under asynchronous DoS attacks
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- On Autocovariance Least-Squares Method for Noise Covariance Matrices Estimation
- Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks
- A Moving Target Defense for Securing Cyber-Physical Systems
- Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks
- State-Secrecy Codes for Networked Linear Systems
- Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach
- An Attack-Resilient Pulse-Based Synchronization Strategy for General Connected Topologies
- Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper
- Optimal Linear Cyber-Attack on Remote State Estimation
- Remote State Estimation in the Presence of an Active Eavesdropper
This page was built for publication: Network steganography based security framework for cyber-physical systems